Get In Touch
Recently by Philip Tellis
JSON Web Tokens (JWT) use digital signatures to establish the authenticity of the data they contain, as well as authenticating the identity of the signer. A valid signature check ensures that any party can rely on the contents and the signatory of the JWT. This is typically accomplished by using an asymmetric signing algorithm such as RS-256 (RSA + SHA256 hash). The "asymmetry" is where the private key of a
The October 2019 Release includes enhancements to Akamai security products with many new and updated capabilities. Highlights and capabilities that our customers have been particularly excited about include: The Bot Intelligence Console provides greater visibility into the bot landscape, allowing you to benchmark against your industry vertical or the platform as a whole, and see everything that Akamai knows about any individual bot. KRS Evaluation Mode makes it easier to
As part of our October release, we are making our onboarding experience much faster and simpler. These benefits are extended to new customers looking to onboard and protect new hostnames on Akamai - as well as existing customers looking to spin up, test, and protect new functionality within their site or applications.
I remember the days when brands captivated users online with dancing aliens (LowerMyBills.com) and Elf Yourself advertising campaigns (OfficeMax). In this new digital era, however, customers are smarter, more powerful, and dictate more than ever how and when they interact with brands. More important than price or product, customer-centric business models are the new competitive differentiator. Positive customer experiences are not only critical for corporate branding but can significantly impact
Today, Akamai announced the October 2019 Release, which introduces new capabilities to our Media product line with a focus on helping customers accelerate their cloud transformation using the power of the edge. Within Media, the new enhancements are highlighted by: Scalable forensic watermarking support from the Akamai Edge, pre-integrated with leading third-party providers to provide a more effective way to trace piracy back to the source. The new Access Revocation
A slow response can wreck an otherwise perfect video playback experience. At least, that is what data shows when it comes to streaming high quality video content to any device, anywhere in the world. While there is no way to control when a slow response will happen, Akamai can offer an alternative when it does.
In my previous blogs, I wrote about how phishing is no longer just an email problem, how the industrialization of phishing is being driven by the easy availability and low cost of phishing toolkits, and how current phishing defenses are being bypassed by attackers.